메뉴 건너뛰기




Volumn 89, Issue , 2017, Pages 72-85

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

Author keywords

Multi gateway; Sensor capture attack; Smart card; User anonymity; Wireless sensor network

Indexed keywords

AUTHENTICATION; GATEWAYS (COMPUTER NETWORKS); INTERNET OF THINGS; NETWORK SECURITY; SMART CARDS; TRANSPORTATION;

EID: 85009936481     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2016.12.008     Document Type: Article
Times cited : (156)

References (53)
  • 2
    • 84948714609 scopus 로고    scopus 로고
    • A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
    • Amin, R., Biswas, G., A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw. 36 (2016), 58–80.
    • (2016) Ad Hoc Netw. , vol.36 , pp. 58-80
    • Amin, R.1    Biswas, G.2
  • 3
    • 84979462212 scopus 로고    scopus 로고
    • Design of anonymity preserving three-factor authenticated key exchange protocol for wireless sensor network
    • Amin, R., Islam, S.H., Biswas, G., Khan, M.K., Leng, L., Kumar, N., Design of anonymity preserving three-factor authenticated key exchange protocol for wireless sensor network. Comput. Netw. 101 (2016), 42–62.
    • (2016) Comput. Netw. , vol.101 , pp. 42-62
    • Amin, R.1    Islam, S.H.2    Biswas, G.3    Khan, M.K.4    Leng, L.5    Kumar, N.6
  • 4
    • 84962038954 scopus 로고    scopus 로고
    • Towards achieving data security with the cloud computing adoption framework
    • Chang, V., Ramachandran, M., Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9 (2016), 138–151.
    • (2016) IEEE Trans. Serv. Comput. , vol.9 , pp. 138-151
    • Chang, V.1    Ramachandran, M.2
  • 5
    • 84949545363 scopus 로고    scopus 로고
    • Cloud computing adoption framework: a security framework for business clouds
    • Chang, V., Kuo, Y.-H., Ramachandran, M., Cloud computing adoption framework: a security framework for business clouds. Future Gener. Comput. Syst. 57 (2016), 24–41.
    • (2016) Future Gener. Comput. Syst. , vol.57 , pp. 24-41
    • Chang, V.1    Kuo, Y.-H.2    Ramachandran, M.3
  • 6
    • 84942767120 scopus 로고    scopus 로고
    • An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography
    • Chaudhry, S.A., Mahmood, K., Naqvi, H., Khan, M.K., An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography. J. Med. Syst. 39 (2015), 1–12.
    • (2015) J. Med. Syst. , vol.39 , pp. 1-12
    • Chaudhry, S.A.1    Mahmood, K.2    Naqvi, H.3    Khan, M.K.4
  • 10
    • 84954105714 scopus 로고    scopus 로고
    • A secure biometric based multi-server authentication scheme for social multimedia networks
    • Chaudhry, S.A., A secure biometric based multi-server authentication scheme for social multimedia networks. Multimed. Tools Appl. 75 (2015), 12705–12725.
    • (2015) Multimed. Tools Appl. , vol.75 , pp. 12705-12725
    • Chaudhry, S.A.1
  • 11
    • 78049334450 scopus 로고    scopus 로고
    • A robust mutual authentication protocol for wireless sensor networks
    • Chen, T.-H., Shih, W.-K., A robust mutual authentication protocol for wireless sensor networks. ETRI J. 32 (2010), 704–712.
    • (2010) ETRI J. , vol.32 , pp. 704-712
    • Chen, T.-H.1    Shih, W.-K.2
  • 12
    • 84902296026 scopus 로고    scopus 로고
    • Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Choi, Y., Lee, D., Kim, J., Jung, J., Nam, J., Won, D., Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography. Sensors 14 (2014), 10081–10106.
    • (2014) Sensors , vol.14 , pp. 10081-10106
    • Choi, Y.1    Lee, D.2    Kim, J.3    Jung, J.4    Nam, J.5    Won, D.6
  • 13
    • 33646779184 scopus 로고    scopus 로고
    • Errors in computational complexity proofs for protocols. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer
    • Choo, K.-K.R., Boyd, C., Hitchcock, Y., Errors in computational complexity proofs for protocols. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer, pp. 624–643.
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 14
    • 33747171940 scopus 로고    scopus 로고
    • The importance of proofs of security for key establishment protocols: formal analysis of jan-chen, yang-shen-shieh, kim-huh-hwang-lee, lin-sun-hwang, and yeh-sun protocols
    • Choo, K.-K.R., Boyd, C., Hitchcock, Y., The importance of proofs of security for key establishment protocols: formal analysis of jan-chen, yang-shen-shieh, kim-huh-hwang-lee, lin-sun-hwang, and yeh-sun protocols. Comput. Commun. 29 (2006), 2788–2797.
    • (2006) Comput. Commun. , vol.29 , pp. 2788-2797
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 15
    • 84864822381 scopus 로고    scopus 로고
    • Secure Key Establishment
    • Advances in Information Security, vol. 41.
    • K. Choo, 2009. Secure Key Establishment. Advances in Information Security, vol. 41.
    • (2009)
    • Choo, K.1
  • 16
    • 84959386693 scopus 로고    scopus 로고
    • An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks
    • Das, A.K., Sutrala, A.K., Kumari, S., Odelu, V., Wazid, M., Li, X., An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur. Commun. Netw. 9 (2016), 2070–2092.
    • (2016) Secur. Commun. Netw. , vol.9 , pp. 2070-2092
    • Das, A.K.1    Sutrala, A.K.2    Kumari, S.3    Odelu, V.4    Wazid, M.5    Li, X.6
  • 17
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das, M.L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8 (2009), 1086–1090.
    • (2009) IEEE Trans. Wirel. Commun. , vol.8 , pp. 1086-1090
    • Das, M.L.1
  • 18
    • 84953352636 scopus 로고    scopus 로고
    • A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
    • Das, A.K., A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl. 9 (2016), 223–244.
    • (2016) Peer-to-Peer Netw. Appl. , vol.9 , pp. 223-244
    • Das, A.K.1
  • 19
    • 84948712087 scopus 로고    scopus 로고
    • An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment
    • Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M., An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Netw. 36 (2016), 152–176.
    • (2016) Ad Hoc Netw. , vol.36 , pp. 152-176
    • Farash, M.S.1    Turkanović, M.2    Kumari, S.3    Hölbl, M.4
  • 20
    • 84916883747 scopus 로고    scopus 로고
    • A variable threshold-value authentication architecture for wireless mesh networks
    • Guo, P., Wang, J., Geng, X.H., Kim, C.S., Kim, J.-U., A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15 (2014), 929–935.
    • (2014) J. Internet Technol. , vol.15 , pp. 929-935
    • Guo, P.1    Wang, J.2    Geng, X.H.3    Kim, C.S.4    Kim, J.-U.5
  • 21
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • He, D., Gao, Y., Chan, S., Chen, C., Bu, J., An enhanced two-factor user authentication scheme in wireless sensor networks. Ad Hoc Sens. Wirel. Netw. 10 (2010), 361–371.
    • (2010) Ad Hoc Sens. Wirel. Netw. , vol.10 , pp. 361-371
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 22
    • 84963682665 scopus 로고    scopus 로고
    • One-to-many authentication for access control in mobile pay-tv systems
    • He, D., Kumar, N., Shen, H., Lee, J.-H., One-to-many authentication for access control in mobile pay-tv systems. Sci. China Inf. Sci. 59 (2015), 1–14.
    • (2015) Sci. China Inf. Sci. , vol.59 , pp. 1-14
    • He, D.1    Kumar, N.2    Shen, H.3    Lee, J.-H.4
  • 23
    • 84949179531 scopus 로고    scopus 로고
    • Introduction to network simulator NS2
    • Springer US
    • Issariyakul, T., Hossain, E., Introduction to network simulator NS2. 2011, Springer US.
    • (2011)
    • Issariyakul, T.1    Hossain, E.2
  • 24
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Jiang, Q., Ma, J., Lu, X., Tian, Y., An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8 (2015), 1070–1081.
    • (2015) Peer-to-Peer Netw. Appl. , vol.8 , pp. 1070-1081
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4
  • 25
    • 84958124876 scopus 로고    scopus 로고
    • Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
    • Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A., Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83 (2015), 2085–2101.
    • (2015) Nonlinear Dyn. , vol.83 , pp. 2085-2101
    • Jiang, Q.1    Wei, F.2    Fu, S.3    Ma, J.4    Li, G.5    Alelaiwi, A.6
  • 26
    • 84954436216 scopus 로고    scopus 로고
    • A privacy preserving three-factor authentication protocol for e-health clouds
    • Jiang, Q., Khan, M.K., Lu, X., Ma, J., He, D., A privacy preserving three-factor authentication protocol for e-health clouds. J. Supercomput. 72 (2016), 3826–3849.
    • (2016) J. Supercomput. , vol.72 , pp. 3826-3849
    • Jiang, Q.1    Khan, M.K.2    Lu, X.3    Ma, J.4    He, D.5
  • 27
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks
    • Khan, M.K., Alghathbar, K., Cryptanalysis and security improvements of two-factor user authentication in wireless sensor networks. Sensors 10 (2010), 2450–2459.
    • (2010) Sensors , vol.10 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 28
    • 84901008838 scopus 로고    scopus 로고
    • An improved user authentication protocol for healthcare services via wireless medical sensor networks
    • Khan, M.K., Kumari, S., An improved user authentication protocol for healthcare services via wireless medical sensor networks. Int. J. Distrib. Sens. Netw., 2014.
    • (2014) Int. J. Distrib. Sens. Netw.
    • Khan, M.K.1    Kumari, S.2
  • 29
    • 84939573910 scopus 로고    scopus 로고
    • Differential Power Analysis
    • In: Wiener M. (eds) Advances in Cryptology — CRYPTO’ 99. CRYPTO 1999, pp. 388-397. Lecture Notes in Computer Science, vol 1666. Springer, Berlin, Heidelberg
    • Kocher, P., Jaffe, J., Jun, B. 1999. Differential Power Analysis. In: Wiener M. (eds) Advances in Cryptology — CRYPTO’ 99. CRYPTO 1999, pp. 388-397. Lecture Notes in Computer Science, vol 1666. Springer, Berlin, Heidelberg.
    • (1999)
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 30
    • 80052427734 scopus 로고    scopus 로고
    • Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks
    • In: (WiAd)
    • Kumar, P., Lee, H.-J., 2011. Cryptanalysis on two user authentication protocols using smart card for wireless sensor networks. In: IEEE Wireless Advanced (WiAd), pp. 241–245.
    • (2011) IEEE Wireless Advance , pp. 241-245
    • Kumar, P.1    Lee, H.-J.2
  • 31
    • 84921608595 scopus 로고    scopus 로고
    • User authentication schemes for wireless sensor networks: a review
    • Kumari, S., Khan, M.K., Atiquzzaman, M., User authentication schemes for wireless sensor networks: a review. Ad Hoc Netw. 27 (2015), 159–194.
    • (2015) Ad Hoc Netw. , vol.27 , pp. 159-194
    • Kumari, S.1    Khan, M.K.2    Atiquzzaman, M.3
  • 32
    • 84883653668 scopus 로고    scopus 로고
    • An enhanced smart card based remote user password authentication scheme
    • Li, X., Niu, J., Khan, M.K., Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36 (2013), 1365–1371.
    • (2013) J. Netw. Comput. Appl. , vol.36 , pp. 1365-1371
    • Li, X.1    Niu, J.2    Khan, M.K.3    Liao, J.4
  • 33
    • 84878597719 scopus 로고    scopus 로고
    • A novel smart card and dynamic id based remote user authentication scheme for multi-server environments
    • Li, X., Ma, J., Wang, W., Xiong, Y., Zhang, J., A novel smart card and dynamic id based remote user authentication scheme for multi-server environments. Math. Comput. Model. 58 (2013), 85–95.
    • (2013) Math. Comput. Model. , vol.58 , pp. 85-95
    • Li, X.1    Ma, J.2    Wang, W.3    Xiong, Y.4    Zhang, J.5
  • 34
    • 84923216123 scopus 로고    scopus 로고
    • Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update
    • Li, X., Niu, J., Liao, J., Liang, W., Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update. Int. J. Commun. Syst. 28 (2015), 374–382.
    • (2015) Int. J. Commun. Syst. , vol.28 , pp. 374-382
    • Li, X.1    Niu, J.2    Liao, J.3    Liang, W.4
  • 35
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Ren, Y.-J., Shen, J., Wang, J., Han, J., Lee, S.-Y., Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16 (2015), 317–323.
    • (2015) J. Internet Technol. , vol.16 , pp. 317-323
    • Ren, Y.-J.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.-Y.5
  • 36
    • 84947804555 scopus 로고    scopus 로고
    • Enhanced secure sensor association and key management in wireless body area networks
    • Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., Sun, X., Enhanced secure sensor association and key management in wireless body area networks. J. Commun. Netw. 17 (2015), 453–462.
    • (2015) J. Commun. Netw. , vol.17 , pp. 453-462
    • Shen, J.1    Tan, H.2    Moh, S.3    Chung, I.4    Liu, Q.5    Sun, X.6
  • 37
    • 84922323888 scopus 로고    scopus 로고
    • A novel routing protocol providing good transmission reliability in underwater sensor networks
    • Shen, J., Tan, H.-W., Wang, J., Wang, J.-W., Lee, S.-Y., A novel routing protocol providing good transmission reliability in underwater sensor networks. J. Internet Technol. 16 (2015), 171–178.
    • (2015) J. Internet Technol. , vol.16 , pp. 171-178
    • Shen, J.1    Tan, H.-W.2    Wang, J.3    Wang, J.-W.4    Lee, S.-Y.5
  • 38
    • 84877308219 scopus 로고    scopus 로고
    • A new user authentication protocol for wireless sensor networks using elliptic curves cryptography
    • Shi, W., Gong, P., A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int. J. Distrib. Sens. Netw., 2013.
    • (2013) Int. J. Distrib. Sens. Netw.
    • Shi, W.1    Gong, P.2
  • 41
    • 84901188390 scopus 로고    scopus 로고
    • A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
    • Turkanović, M., Brumen, B., Hölbl, M., A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Netw. 20 (2014), 96–112.
    • (2014) Ad Hoc Netw. , vol.20 , pp. 96-112
    • Turkanović, M.1    Brumen, B.2    Hölbl, M.3
  • 42
    • 14844304757 scopus 로고    scopus 로고
    • Cuti, S.-f., Gardiner, C., Lynn, C., Kruus, P., Tinypk: securing sensor networks with public key technology, In: Proceedings of the 2nd ACM Workshop oSecurity of Ad hoc and Sensor Networks, ACM
    • Watro, R., Kong, D., Cuti, S.-f., Gardiner, C., Lynn, C., Kruus, P., Tinypk: securing sensor networks with public key technology, In: Proceedings of the 2nd ACM Workshop oSecurity of Ad hoc and Sensor Networks, ACM, pp. 59–64.
    • Watro, R.1    Kong, D.2
  • 43
    • 85012104670 scopus 로고    scopus 로고
    • An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks
    • Wu, F., Xu, L., Kumari, S., Li, X., An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multimed. Syst., 2015.
    • (2015) Multimed. Syst.
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 44
    • 84936129205 scopus 로고    scopus 로고
    • A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof
    • Wu, F., Xu, L., Kumari, S., Li, X., Alelaiwi, A., A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof. Secur. Commun. Netw. 8 (2015), 3847–3863.
    • (2015) Secur. Commun. Netw. , vol.8 , pp. 3847-3863
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4    Alelaiwi, A.5
  • 45
    • 85008349528 scopus 로고    scopus 로고
    • A new and secure authentication scheme for wireless sensor networks with formal proof
    • Wu, F., Xu, L., Kumari, S., Li, X., A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw. Appl., 2015.
    • (2015) Peer-to-Peer Netw. Appl.
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 46
    • 84942364844 scopus 로고    scopus 로고
    • A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks
    • Wu, F., Xu, L., Kumari, S., Li, X., A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput. Electr. Eng. 45 (2015), 274–285.
    • (2015) Comput. Electr. Eng. , vol.45 , pp. 274-285
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 47
    • 84978173214 scopus 로고    scopus 로고
    • A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
    • Wu, F., Xu, L., Kumari, S., Li, X., Das, A.K., Khan, M.K., Karuppiah, M., Baliyan, R., A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Netw. 9 (2016), 3527–3542.
    • (2016) Secur. Commun. Netw. , vol.9 , pp. 3527-3542
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4    Das, A.K.5    Khan, M.K.6    Karuppiah, M.7    Baliyan, R.8
  • 48
    • 84992698502 scopus 로고    scopus 로고
    • A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security
    • Wu, F., Xu, L., Kumari, S., Li, X., A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J. Ambient Intell. Humaniz. Comput., 2016.
    • (2016) J. Ambient Intell. Humaniz. Comput.
    • Wu, F.1    Xu, L.2    Kumari, S.3    Li, X.4
  • 49
    • 84906330795 scopus 로고    scopus 로고
    • Construction of tree network with limited delivery latency in homogeneous wireless sensor networks
    • Xie, S., Wang, Y., Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel. Pers. Commun. 78 (2014), 231–246.
    • (2014) Wirel. Pers. Commun. , vol.78 , pp. 231-246
    • Xie, S.1    Wang, Y.2
  • 50
    • 84963958402 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care
    • Xu, L., Wu, F., Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J. Med. Syst. 39 (2015), 1–9.
    • (2015) J. Med. Syst. , vol.39 , pp. 1-9
    • Xu, L.1    Wu, F.2
  • 51
    • 84919348312 scopus 로고    scopus 로고
    • An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
    • Xu, L., Wu, F., An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur. Commun. Netw. 8 (2015), 245–260.
    • (2015) Secur. Commun. Netw. , vol.8 , pp. 245-260
    • Xu, L.1    Wu, F.2
  • 52
    • 84870693016 scopus 로고    scopus 로고
    • A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks
    • Xue, K., Ma, C., Hong, P., Ding, R., A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36 (2013), 316–323.
    • (2013) J. Netw. Comput. Appl. , vol.36 , pp. 316-323
    • Xue, K.1    Ma, C.2    Hong, P.3    Ding, R.4
  • 53
    • 84863637154 scopus 로고    scopus 로고
    • A security-performance-balanced user authentication scheme for wireless sensor networks
    • Yoo, S.G., Park, K.Y., Kim, J., A security-performance-balanced user authentication scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw., 2012.
    • (2012) Int. J. Distrib. Sens. Netw.
    • Yoo, S.G.1    Park, K.Y.2    Kim, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.